The full-duplex device-to-device security communication under the coverage of unmanned aerial vehicle

Qian Zeng, Zhongshan Zhang*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)

Abstract

Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system’s (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)’ secure coverage probability in downlink transmission is mainly impacted by the following three factors: Its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs’ secure coverage probability is relevant to state of the UAV. The system’s secure capacity can be substantially improved by adaptively changing the UAV’s position as well as coverage.

Original languageEnglish
Pages (from-to)1941-1960
Number of pages20
JournalKSII Transactions on Internet and Information Systems
Volume13
Issue number4
DOIs
Publication statusPublished - 30 Apr 2019

Keywords

  • Coverage probability
  • Device-to-device communication
  • Full-duplex
  • Security communication
  • Unmanned aerial vehicle

Fingerprint

Dive into the research topics of 'The full-duplex device-to-device security communication under the coverage of unmanned aerial vehicle'. Together they form a unique fingerprint.

Cite this